Dutch ‘Cozy Bear’ Farce Does Not Show DNC Emails Were Hacked By Russians

Via Adam Carter at Disobedient Media

Yesterday saw the publication of an English language version of an article written by Huib Modderkolk by Dutch news site the Volkskrant, titled “Dutch agencies provide crucial intel about Russia’s interference in US-elections.”

The article explains how Dutch intelligence agency AIVD were monitoring “Cozy Bear” (APT-29) as far back as 2014, and states that a year later the intelligence agency witnessed an attack against the Democratic National Committee (DNC).

“That’s how the AIVD becomes witness to the Russian hackers harassing and penetrating the leaders of the Democratic Party, transferring thousands of emails and documents. It won’t be the last time they alert their American counterparts. And yet, it will be months before the United States realize what this warning means: that with these hacks the Russians have interfered with the American elections. And the AIVD hackers have seen it happening before their very eyes.”

However, despite all the above assertions, there was no major leak of documents related to the DNC in 2015. The emails that were released in 2016 were acquired earlier that same year – so, it’s not clear what it was the AVID saw “happening before their very eyes” so early on.

Of course, it’s unsurprising to read on and discover:

“The Dutch access provides crucial evidence of the Russian involvement in the hacking of the Democratic Party, according to six American and Dutch sources who are familiar with the material, but wish to remain anonymous.”

The article is already introducing ambiguity between Dutch and US-based sources and, of course, those sources want to be anonymous and are not attributed to the agencies or organizations they are affiliated with.

This is then followed by a statement that may create complications for those wanting to see accountability on what they suspect to be FISA abuses. The article relates:

“It’s also grounds for the FBI to start an investigation into the influence of the Russian interference on the election race between the Democratic candidate Hillary Clinton and the Republican candidate Donald Trump.”

The article also claims that the US intelligence community made their “high confidence” assessment on the back of AIVD’s intel:

“Three American intelligence services state with ‘high confidence’ that the Kremlin was behind the attack on the Democratic Party. That certainty, sources say, is derived from the AIVD hackers having had access to the office-like space in the center of Moscow for years.”

While it’s true that the Grizzly Steppe joint analysis report from December 31, 2016, does mention APT-28 and APT-29, much of the referenced material there comes from what was reported by CrowdStrike, Fidelis, etc in relation to their efforts to investigate in 2016 .

However, in the intelligence community assessment (ICA), the document that actually contains the majority of the conclusions (released on January 5, 2017) doesn’t even cite the APT group (“Cozy Bear”/APT-29).

Understandably, there’s no mention of AIVD but it’s extraordinary not to make a reference in the document to the APT group if certainty for assessments was derived in relation to it.

It’s also strange to make a reference to MH17 without actually explaining it’s relevance for context:

“The Dutch hacker team spends weeks preparing itself. Then, in the summer of 2014, the attack takes place, most likely before the tragic crash of flight MH17. With some effort and patience, the team manages to penetrate the internal computer network. The AIVD can now trace the Russian hackers’ every step. But that’s not all.”

Putting that oddity aside, we’re then told the following:

“The Cozy Bear hackers are in a space in a university building near the Red Square. The group’s composition varies, usually about ten people are active. The entrance is in a curved hallway. A security camera records who enters and who exits the room. The AIVD hackers manage to gain access to that camera. Not only can the intelligence service now see what the Russians are doing, they can also see who’s doing it. Pictures are taken of every visitor. In Zoetermeer, these pictures are analyzed and compared to known Russian spies. Again, they’ve acquired information that will later prove to be vital.”

We could question how they knew, remotely, where different IPs were on the network in relation to the CCTV. One may also wonder how it’s known that the IP traced there wasn’t just a botnet relay (University networks are often targeted). Another issue is in regards to whether there was any consequence from comparing photos with known Russian spies, but this was all in 2014 – so none of this even relates to the DNC being hacked.

The article continues, explaining that the state department was targeted in November 2014 – which was reported on by the mainstream press at the time.

Then, we get to this section of the text:

“Access to Cozy Bear turns out to be a goldmine for the Dutch hackers. For years, it supplies them with valuable intelligence about targets, methods and the interests of the highest ranking officials of the Russian security service. From the pictures taken of visitors, the AIVD deduces that the hacker group is led by Russia’s external intelligence agency SVR.”

What’s interesting about this is that the US intelligence community has attributed APT-29 and APT-28 to the FSB and GRU, not the SVR (which actually would have made more sense). The only time they mention the SVR in the JAR or ICA reports was about separate activity relating to 2010.

Going further into the article, past the grossly familiar repetition of “undermining our democracy” hyperbole from Chris Painter, who expresses dismay that Russia would target politicians in the US, Volkskrant reports:

“In return, the Dutch are given knowledge, technology and intelligence. According to one American source, in late 2015, the NSA hackers manage to penetrate the mobile devices of several high ranking Russian intelligence officers.”

So here we return to an anonymous American source connected to the NSA, conceding that the NSA had hacked Russian intelligence officials in 2015. What did they learn from this?

“They learn that right before a hacking attack, the Russians search the internet for any news about the oncoming attack. According to the Americans, this indirectly proves that the Russian government is involved in the hacks.”

The one thing I’d inquire on here is whether the searches were genuinely specific to those attacks or whether Russian intelligence officials frequently search for hacks/leaks relating to America that may have been inferred as a causative correlation. With no examples cited, it’s difficult to assess whether it’s significant or a false-positive.

Continuing on, we are offered a speculative statement from another nameless source towards the conclusion of the text for no apparent reason. The final lines of the work address a topic with no direct connection to the rest of the story, but is nonetheless spewed out as follows:

“Another source says it’s ‘highly likely’ that in return for the intelligence, the Dutch were given access to this specific American information. Whether any intelligence about MH17 was exchanged, is unknown.”

If you think it’s odd that MH17 gets cited again, without cause or reason, you’re not alone (I know a few others have noticed this too).

As the article heads towards it’s conclusion, no reference to any technical details regarding the DNC being hacked is provided and there is no evidence cited that actually bolsters the hacking allegations we’ve already heard regarding the DNC.

Instead, we skip ahead to Clinton and Trump:

“After her defeat in November 2016, Clinton will say that the controversy about her leaked emails are what cost her the presidency.”

Clinton’s leaked emails (as opposed to those from the DNC finance staff and John Podestaactually came from an FOIA request.

“President elect Donald Trump categorically refuses to explicitly acknowledge the Russian interference.”

That’s probably because:

The article continues:

“It would tarnish the gleam of his electoral victory. He has also frequently praised Russia, and president Putin in particular. This is one of the reasons the American intelligence services eagerly leak information: to prove that the Russians did in fact interfere with the elections.”

And yet, despite all the resources at their disposal and a dragnet they maintain that catches all traffic in and out of the US, American intelligence services have been unable to provide any definitive proof supporting their assessments and have relied on assessing questionable evidence produced by a private-sector company that the DNC hired to investigate the alleged hacking of DNC emails while the DNC repeatedly rebuffed offers to assist and requests to investigate from intelligence agencies.

Finally, this evidence-lacking spin-fest of an article, devoid of any new evidence relating to the DNC having its emails acquired by unauthorized parties, concludes with:

“This has led to anger in Zoetermeer and The Hague. Some Dutchmen even feel betrayed. It’s absolutely not done to reveal the methods of a friendly intelligence service, especially if you’re benefiting from their intelligence. But no matter how vehemently the heads of the AIVD and MIVD express their displeasure, they don’t feel understood by the Americans. It’s made the AIVD and MIVD a lot more cautious when it comes to sharing intelligence. They’ve become increasingly suspicious since Trump was elected president.”

It’s disappointing, I’m sure, to hear AIVD “don’t feel understood” by the Americans. However, as Suzie Dawson pointed out, AIVD appear to be far from impartial and independent (even though the article gives that impression). In fact, it appears, from past leaks, that AIVD acts as a second-tier Third Party partner of the NSA and has had multiple points of contact available for the NSA to communicate with them ever since 2013.

Whether or not this is a deliberate effort to ‘gas-light’ us from one of the NSA’s international partners or not, one thing is for sure, the Volkskrant article contains nothing new or significant relating to the DNC being hacked or any details directly related to the emails being acquired.

For more reasons why the Volkskrant article is fake news, be sure to check out Suzie Dawson’s article too.

Comments

Neochrome Sat, 01/27/2018 - 09:27 Permalink

OMFG I hax0r3d fucking University security camera I am so smart. Me and every student ever.

But yeah, let's talk some more bullshit instead of accepting what Assange indicated: His name is Seth Rich.

MoreFreedom Neochrome Sat, 01/27/2018 - 17:53 Permalink

Obama has a friend in Danish prime minister Helle Thorning-Schmidt, whom he took a selfie while Michelle wasn't too happy with his flirting.  He had her produce another report, just like his fake report that the Russians hacked the DNC and Podesta, while Wikileaks told us it wasn't a foreign actor.   

http://www.telegraph.co.uk/news/worldnews/nelson-mandela/10510889/Barac…

In reply to by Neochrome

D. G. Neree zerocash Sun, 01/28/2018 - 18:28 Permalink

Yes, sadly the majority of the people in Holland are still brainwashed into thinking that doing good to other people justifies every evil deed on earth even sacrificing yourown family, background, country and culture. But the tide is changing. one day the threshhold will be reached and the people will wake up. If it's not too late by then.

In reply to by zerocash

DuneCreature Sat, 01/27/2018 - 09:50 Permalink

The biggest hacker gang on the planet earth (30,000 + just at HQ) and their gangland contractor buddies (0.25 mil?) are the US-NSA Gangsters.

On that note..........

Want to keep your Bitcoin......YOURS? ...... You may want to consider this:

A 'Jim Stone Special' Linux OS on a Flash Drive. Jim is a former NSA dude who knows what those NSA (Nefarious Spying Assholes) are constantly up to!

(Plus it helps support Stone and helps keeping his great inside intel coming at us.)

I won't swear with 100% certainty that a 'booty-able flash drive' will overcome and seal off the Intel built-in backdoor BUT it is a damn sight better than Window$ (Version - Anything) at securing your Crypto Wallet.

Remember time, connection speed and processor cycles are your security nemesis.

You may want to consider using a Linux OS flash drive for JUST your crypto wallet. ...... Lightening In-and-Out ©, just like going to the bank ATM. .. The less time you spend loitering around the ATM with cash in your hand the less chance you have being mugged and robbed.

Obscure your file names, password protect your directories and make a hacker bot crawler jump through multiple hoops getting to your little vault of Bitcoin.

Live Hard, Just Another Dune-Tactical-Tip© In An AI-AL-World© To Help Keep The Criminal Dot Gov And Their Hacker Bandit Butt Buddies From Pilfering Your Hard Earned Assets, Die Free

 ~ DC v8.6

jin187 DuneCreature Sat, 01/27/2018 - 12:38 Permalink

I get so tired of hearing about this "backdoor".  It's not some shit where you can click a few keys on your computer, and poof hAxXx0rZ like Wargames, or 24.  You need to have access to the device already, or to trick the user into installing malware, just like nearly every exploit ever.  It affects cloud servers because it's one big processor made of other processors, meaning anyone with access to one processor can access the whole thing.  On your personal computers, and physical servers, unless you're dumb enough to install the malware yourself, you are not affected in any way.  I say that because if the NSA is sneaking into your house to fuck with your computers, the least of your problems is that your PC has yet another exploit among the thousands they could abuse.  Not to mention if you're dumb enough to install this exploit, you were probably already infected with every other manner of tracking malware fucktards tend to get on their computer anyway. 

In reply to by DuneCreature

DuneCreature jin187 Sat, 01/27/2018 - 13:29 Permalink

All very true, but how many store important data on the same machine they use to surf the Internet? ……. The web is crawling with Malware ready to bite.

Then there’s that little problem of the alleged stealth wifi modem built right into the motherboards (Unverified by me but Jim Stone seems to think it’s true and I have heard similar things elsewhere.)

Are you saying the Intel chip ‘look ahead cache’ of instructions can’t be accessed remotely?

I seriously don’t know,….you tell me.

Live Hard, I Sometimes Know Just Enough About Solid Fuel Rocket Motors To Be Dangerous Too,..... So I've Been Told By Those Who Ought To Know Danger When They See It Walking Through The Test Site, Die Free

~ DC v8.6

In reply to by jin187

SHRAGS jin187 Sat, 01/27/2018 - 16:14 Permalink

No, these backdoors allow browser drive-by java hacks of your systems memory, potentially leaking passwords,& encryption keys. 

As Alan Cox, a senior Linux developer and Intel software engineer, wrote on Google+ [sic]: "What you do need to care about big time is JavaScript because the exploit can be remotely used by javascript on web pages to steal stuff from your system memory. Mozilla and Chrome both have pending updates. and some recommendations about protection. Also consider things like Adblock and extensions like noscript that can stop a lot of junk running in the first place. Do that ASAP."

Snowden said the crypto maths was secure, they went after the endpoints https://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-…

Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.

Your encryption keys in memory are the target.

 

How the Meltdown and Spectre security holes fixes will affect you http://www.zdnet.com/article/how-the-meltdown-and-spectre-security-hole…

 

A good explanation of how these hacks work:Meltdown and Spectre: what are they and what should I do? https://hackernoon.com/meltdown-and-spectre-what-are-they-and-what-shou…

 

Deep explanation of Meltdown & Spectre: WHY RASPBERRY PI ISN’T VULNERABLE TO SPECTRE OR MELTDOWN https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-sp…

In reply to by jin187

DuneCreature SHRAGS Sun, 01/28/2018 - 06:50 Permalink

A note about encryption -

The random number generators in ALL of the processors are toast.

If the random number generators are toast so is your encryption.

Just another - That Dune Bozo Public Service Announcement.

The risk is yours.

Live Hard, You Have Been Bozo Buzzer And Clown Horned Warned,...* Beep, Beep, Beep, Beep, Beep, Honk, Honk, Tinkle, Tinkle *,  Die Free

~ DC v8.6

 

In reply to by SHRAGS

swmnguy SHRAGS Sun, 01/28/2018 - 10:37 Permalink

An increasing number of websites won't run--at all--until you turn off your AdBlock and NoScript extensions.  Web ads have become so obnoxious and so intrusive, interfering with you ability to view sites and use them, that it's essential just for ease of use to run these extensions, and then the sites themselves won't permit use of those sites.

It's a perfect setup for hackers; sneak into the sites that force users to "lower their shields," then pounce.

Ads are more easily dealt with on a computer than on a mobile phone.  On phones, they often take over the entire screen, and disable the back button.  One has to actually close the browser to get out of the ad, and then go back to the site.  More opportunities for the bad guys.

In reply to by SHRAGS

A Sentinel jin187 Sat, 01/27/2018 - 19:19 Permalink

I connected the backdoor with the nsa demanding (a few years ago) that PGP and other cryptography supply them with backdoor keys.

getting intel to put in a vulnerability allowing the crypto exploit is a gimme.

It follows naturally from that they’d have software to use the crypto on anything and anybody.

but I don’t *know* that. It just made sense 

In reply to by jin187

Grandad Grumps Sat, 01/27/2018 - 10:16 Permalink

Bullshit. It is not hard to figure out that the only reason we are allowed to have software and hardware is because it has all been pre-compromised and all updates and security patches allow additional features and access for those who control us. Does anyone really believe that the Intel flaw was unintentional? It is all FAKE. It is all a FARCE. The joke is on us. And yet, we chose to participate in the joke. Our "opportunity" to escape is when we die. Choose wisely.

At one time I thought that they would need tp chip us to join us to their Borg central mind. Now, we are seeing every day new technology that allows thoughts to be read and implanted without hardwiring. Our brains can and do communicate wirelessly ... and we, even without our physical body do the same thing.

farmboy Sat, 01/27/2018 - 10:55 Permalink

The Volkskrant is a notorious leftist/progressive semi intellectual newspaper in the Netherlands. Nobody reads it anymore for good reasons.

cwsuisse Sat, 01/27/2018 - 12:12 Permalink

There have been plenty of signs early on that the "cozy bear" story is bullshit, fake news, an invention, however you would like to call this. It is obviously another desperate attempt to confuse people and to market the story of a Russian intervention in the US election. Had the Russians really intervened the american president today would likely be rather somebody like Anna Netrebko than Trump. And that would be better because her looks and her voice are superior.

SpanishGoop Sat, 01/27/2018 - 12:30 Permalink

"later the intelligence agency witnessed an attack against the Democratic National Committee (DNC)."

Dutch mentality.

Do not try to stop it but brag "i saw it happen" about it later on.

 

 

Exota Sat, 01/27/2018 - 12:44 Permalink

right if you're a Russian fsb  hacker and want to hack ultra secret things ,you leave the name of the Russian bear , cozy/fancy bear.

Did the dutch used "the tulip boys" ?

All BS

. . . _ _ _ . . . Sat, 01/27/2018 - 13:03 Permalink

The Dutch hacked the Russians to show that Russian hackers are evil ??
It's almost like saying that killing is so morally reprehensible that we must kill those who do.
'But Mommy, it all started when he hit me back!'

Everybody is hacking everybody. But what happened at the DNC was a leak, not a hack, so I don't see the relevance of this type of story, in the first place.

thebigunit Sat, 01/27/2018 - 13:21 Permalink

This is the Al Franken election all over again.

Democrats never look for the truth, they look for the narrative that explains WHAT THEY WANT TO BE TRUE!

In the Al Franken election, Democrats kept counting and recounting votes to close the gap on the Republican candidate.  And then, when a mysterious cache of votes showed up that put Franken in the lead, THEY STOPPED COUNTING.

Same story with the Russian hacking.  The Democrats are LOOKING for a story that explains why Hillary lost.

Maybe THIS is the one.  YES! This is the one!

HILLARY WON THE ELECTION!  SCHEDULE THE INAUGURATION!

SMC Sat, 01/27/2018 - 13:41 Permalink

Hitlary was right about one thing, "if he gets elected, we're all going to hang"... lol

The propaganda is so bad now that a 4th grader can see thought it. ROFL! The water level is going down in the swamp. :-) . Only question is: Who is in charge? The elected representatives or the Military-Industrial-Security-Medical-BS-Complex.

If it is Military-Industrial-Security-Medical-BS-Complex, the rest of the world will have no choice but to put us down as rabid animals.

oromae Sat, 01/27/2018 - 18:25 Permalink

Crowdstrike planted the russian malware on the dnc server. The images were months out of date (they were the latest copies they could lay their hands on) and both reported to an ip that had been deactivated nearly a year prior. So obvious even fbi analysts would have caught it had they been allowed access.

 

beijing expat Sat, 01/27/2018 - 19:34 Permalink

Why this?  Why now?  What are the Dutch laying the groundwork for?  Is it because they were being used by the Obama whitehouse to ferry information on team Trump from the NSA to the FBI at the behest of the CIA?

 

The FBI messages make no mention of FISA 702 searches  They only talk about letting Hillary off the hook.  So who was behind the actual spying?  

 

We we know that it was done by contractors, Fusion GPS and Crowdstrike, but they don't seem to have been working for the FBI.  Who was paying them and why?  How did they channel what they gleaned back to the FBI and DOJ?  Was it through GCHQ and Dutch intl?  Is Dutch intl laying the groundwork for its defense when they come up in committee hearings?  

 

 

D. G. Neree beijing expat Sun, 01/28/2018 - 18:17 Permalink

Why this?

Because the new government of traitor-robot Mark Rutte has a law in the making that will allow the government to spy on ALL internet and phone traffic. He uses this as proof that the AIVD does good work and we need this law. (Nobody aparrently sees the contradiction in this.)

Why now?

Because there are elections on the 21st of may and the old political (correct) cartel wants to push through a lot of new laws (like forbidding referendums) before they lose more ground than they already have.

This shows that the american and the dutch swamps are closely connected.

In reply to by beijing expat

New_Meat Sat, 01/27/2018 - 21:05 Permalink

How far back did the FISA (and pre-FISA surveillance) abuses go?  Did Obama (OK, OK, OK, Valerie Jarrett) "penetrate" Romney's campaign in '12?

I'm going with the affirmative on that one.

Obama's electoral corruption goes back to his first run for office in Chicago, in State Senate race, in U.S. Senate race.  That was one corrupt machine behind him, how else does Rahm keep his "seat"?

- Ned

swmnguy New_Meat Sun, 01/28/2018 - 11:17 Permalink

FISA court abuses go back to 1978.  Out of something like 34,000 applications for snooping warrants as of 2013, 11 were rejected.  11 out of 34,000, and that's through 5 years ago.

The Surveillance State was formed out of corruption.  It's might interesting that the US political Right is only now noticing this.  So interesting, in fact, it seems like sour grapes.  

Ask anybody who was active in the Civil Rights movement in the '50s and '60s and '70s; anyone who opposed the Cold War and the Vietnam War; anyone active in the "No Nukes" movement in the '70s and '80s; anyone who opposed US dirty wars throughout Latin America for the past 50 years.  Anyone who had an active enough role in such groups has "enjoyed" annual IRS audits, at which they often got money back because people like that usually don't have much money and do their own taxes.  They've had FBI agents show up at their workplaces and smear them to their bosses, who usually supported them because people like that tend to be extremely conscientious workers.  They've had their phones pop and hiss and echo and click and buzz for so long they're used to it and get suspicious when they get a clear line.  They're used to their mail arriving late and obviously having been opened.

Indeed, it's kind of hard for us to even notice Obama's corruption.  His Presidency was pretty much Reagan's 8th and 9th terms, and Trump's first has functioned so far as Reagan's 10th, in terms of policy and tone.  Everybody on the actual Left in America knew what was up with Obama from the start; slow learners figured it out when both McCain and Obama promised, in October of 2008, if elected to name as Treasury Secretary one Timothy F. Geithner.  Real idiots figured it out about Obama when he named Rahm Emanuel as his Chief of Staff.  Then, nobody at all was surprised when Obama had Harry Reid assign ACA ("ObamaCare," "RomneyCare," "HeritageFoundationCare;" call it what you will) to Max Baucus' Finance Committee rather than Tom Harkin's Healthcare Committee, and had Baucus expel and arrest doctors and nurses who showed up to testify in favor of opening up Medicare to everybody.

So now the Righties have noticed that Washington is corrupt.  Isn't that just fucking adorable. 

In reply to by New_Meat

SixIsNinE swmnguy Sun, 01/28/2018 - 15:31 Permalink

great comment - but i thought Poppy took over for Raygun after one of his kronies got Raygun shot - so Bush could complete the coverup of his Kabal JFK assassination.  (when Ronnie reappeared after his hospital stint, he went back to his forte, acting in front of the camera, which i think we could agree he was very good at)

and Trump is trying to get a new era going after 55 years of the fallout of the JFK hit...

 

In reply to by swmnguy

. . . _ _ _ . . . Sat, 01/27/2018 - 23:05 Permalink

These references to MH-17 are a seed planted now to control the narrative.
Something tells me that there is new (or previously hidden) evidence against Ukraine.
Ukraine is the next war zone, and MH-17 might just be the impetus, or at least, a strong catalyst/justification.

Jung Sat, 01/27/2018 - 23:34 Permalink

The Dutch works closely in line with US agencies and they have to come up with bad stuff about Russia since they still have to get more support for their conclusions around MH17 (remember it is the Dutch leading the investigation and Ukraine is part of the "objective" team that provided "evidence"). 

DuneCreature Sun, 01/28/2018 - 10:29 Permalink

Confused Yet?

That's the idea. ..... AI AL likes you confused.

You know who we have to thank for our rapidly arriving Techno Tyranny (and our swell new shadow pal, AI AL), right?

No it's not the Cyber Grinch. ........ No it's not Cooooooobra. ... It's not the Wicked Witch of the North either.

The CIA? ...... Nope, but warmer.

The DIA? .. No.

The FBI? .. No, They're just armed thugs. .... The little 'mussels' for AL. heheh!

The NSA! ........ Ha, they wish they were as good at spying, snooping and collecting 'Control File' data as the real asswipes I'm referring to.

The Russians? ....... Well, all of the above work for the Master Criminal Bosses and kiss AI AL's cute little rubber bumper.

Who? .... Who, Dune? .... Please tell us! .. We NEED to know, NOW!

I can't tell you.

It's a National Security Top Secret Q-Level Clearance Ultra Black No-No to even mention who the Mr. Big Techno Evil dudes are.

I might get in trouble for even hinting at what their true identity might be.

Let's drop the subject and watch a light-hearted video, shall we?

You just know the bad guys and AI AL are listening to every word on ZH.

Let's go to the movies where we can talk in private.

A Silly Spy Thriller With An Aussie Narrator Dude With Hints About Who The Mr. Big Techno Evil Monsters Might Be.

Popcorn, anyone?

Oh, and that National Security Top Secret Q-Level Clearance shit I was taking about earlier. .......... It's not American National Security that Mr Big & Co. are worried about at all. ....... It's (((their own))) little nation that really counts....................for now anyway.

Until they just flat out take over the whole world and don't need a little safe haven hide-out any longer.

Live Hard, Sleep Through The Techno Spy Thriller Horror Flick At Your Own Peril, Die Free

~ DC v8.6

D. G. Neree Sun, 01/28/2018 - 18:02 Permalink

I am a Dutchman and before the ink of the newspaper was dry, Minister-President Mark Rutte blabbed to all the news media that this was proof that The Netherlands needed the law that is about to be put in place that will allow the government to collect ALL internet traffic and phone coversations etcetera. ALL of it.

Also ALL the news media copied the story without questions and there was a storm of tweets of people (??) who applauded this incredible feat of the AIVD. I am really grateful for foreign outlets like Zerohedge, because in The Netherlands everything is corrupted by the main stream political correct traitors that sold our country to the EU and is flooding it with analfabetic barbarians with a satanic religion.

This farce as you rightly call it shows only one thing: and that is that the American swamp and the Dutch swamp are connected and that our secret service is now a political intrument for what is named as the party-cartel, that is the old political guard that has become more despicable and dangerous by the day.

We are living here as second rate citizens by now and  our government is in cahoots with the extreme left, the street thugs of Antifa and International Socialists in conjunction with Black Lives Matter and the many Palestine Comittees here.

I could go on but I'll stop here saying that we are living in a strange and dangerous situation here. Our leaders are at war with us and it's high time the people should wake up and stop this madness.